First published: Tue Oct 20 2020(Updated: )
A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
M2crypto Project M2crypto | ||
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25657 is a vulnerability in all released versions of m2crypto that makes them vulnerable to Bleichenbacher timing attacks in the RSA decryption API.
CVE-2020-25657 can lead to the compromise of confidentiality in the affected software.
The severity of CVE-2020-25657 is high, with a CVSS base score of 7.5.
Update to the latest version of m2crypto or apply the patches provided by the vendor.
You can find more information about CVE-2020-25657 on the CVE website (https://www.cve.org/CVERecord?id=CVE-2020-25657) and the NIST National Vulnerability Database (https://nvd.nist.gov/vuln/detail/CVE-2020-25657).